Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/05/2024, 01:53
Static task
static1
Behavioral task
behavioral1
Sample
22b0be33d833c3b1d0985d7aa26eb3a6_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
22b0be33d833c3b1d0985d7aa26eb3a6_JaffaCakes118.html
Resource
win10v2004-20240426-en
General
-
Target
22b0be33d833c3b1d0985d7aa26eb3a6_JaffaCakes118.html
-
Size
461KB
-
MD5
22b0be33d833c3b1d0985d7aa26eb3a6
-
SHA1
400775fb7134f12af8aea3af68a9b34968b7bc46
-
SHA256
b867ed2033ee96742c6ecc48e77b71752b2a8b1ef1f3ea4daacb39ecab85bfef
-
SHA512
014890885475fcd18a5da5db917098e78b9cbeabd92c812868e6ad278dacb66ea872dca4ae26279267ae59c785ea3bec3f9657c0211c073d9a92ab2ce2295bd2
-
SSDEEP
6144:SbsMYod+X3oI+Y/sMYod+X3oI+YhsMYod+X3oI+YLsMYod+X3oI+YQ:Q5d+X3d5d+X3L5d+X315d+X3+
Malware Config
Signatures
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a700000000002000000000010660000000100002000000091a149b23217c1a99fe0d75d5e6df785ac7420b90cb9dab0cd0be98b91d2bbf5000000000e80000000020000200000003666369a678b58a65b1766bcafccf3ddc0489623fe68ef045c9f059158b4a52e20000000ad1077d70d09127e8a1bdb755e03ffd244b0c2ad90d2c941ae4e57453533fdd1400000005d6dc282feb7e8c46211f550d3f1df54502b764a890c52312a7bd2c592b815b700cf2998dceacb0a5c0f2c3c92c7e7878db2da4db0adc9899140f2109bd4bcaf iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = f0ad188ceaa0da01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "421295048" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000071c834f68b8ed044a0afda50fbc58a70000000000200000000001066000000010000200000004f3cd98d99f8f52a7a9a2d31d83d3c7dda515e9fda7d6ae5068910b4434d5357000000000e8000000002000020000000e6b8f89bd390996229867fed8cab73dfb453143390ed0d769b52f846fdbed74590000000bf57513aa40f2d222538b9b74f0fe295ae387599ea5cf4eedb0c3e0592dd452803e6c6b06ef09d0c9bb49b0729d61a96198e4740a1fb15d40a47b9d53e08bfa2edb84b92f69eaa02c0243d30e8070dd7765466ecac90a1ab7649afc6f5d3cda57be227490957c3d2f467bc7ffe4655149156de6ce62b7958769ac6d2783e59ed19ed0bc2d0c9d6ed19be47e7e07ff9e94000000060d9e4f9b34ccc76d9103128bf07d185d83a0cf9c9dcd76d9f82f00f2cc49e9d6c2efe122d55308e3c220b213de2f36295836bb64e05c291916b79c298583980 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B3A893D1-0CDD-11EF-972F-E61A8C993A67} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1940 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1940 iexplore.exe 1940 iexplore.exe 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE 2364 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2364 1940 iexplore.exe 28 PID 1940 wrote to memory of 2364 1940 iexplore.exe 28 PID 1940 wrote to memory of 2364 1940 iexplore.exe 28 PID 1940 wrote to memory of 2364 1940 iexplore.exe 28
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\22b0be33d833c3b1d0985d7aa26eb3a6_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1940 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5beb72069aee76fbd37469883692c81f6
SHA1b890cc34eceaaa6f839270569c01af62375d0427
SHA256805cad4fbee493d2420d5da572b711215fdbb94172fc5f9f1fcf474418bc393f
SHA51231887b4838709912d6a5ceabe9868810659b1756c48ef952a462abf046f63b69290bce9abfa2103bb3e660efbbb3256e461a4a4bc0d4be43cf265746fe271b44
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD546f6771a3652e046ffc2b3e73d5339ee
SHA1eeccb5fabd0880c64cff4340a6acb176fd753f84
SHA2560e0ecae5c8a489e003f1678bd7ec0a66b315667813180ceeeff25aab517e92b2
SHA512798d748f05c3c33146ab9cde9086d549a4451bb4f41a04688a55b8aee094decfc64df7c9de39a0ee201697998f28ebc9bb32561a7b9c2f8765d0d5fb07b73cd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55fb72afd5605c8070d94641b328add51
SHA1284fda4281ef0838271d11a8330c06f1880b6323
SHA256d2f54c528ee4c39832d747d778b7aa4d719ad5d584cd368b139e223a62225f43
SHA512af4e7a913df39283aaa739577101691fc8709749f669d7d2d4c18d8443cd6a20d2d386eca4a7a1a45c6c98163c1e358cd58bbb11050aaef7f574b125e350ee72
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD552c1beffb0906ad744f62af3e86c7953
SHA1443460a01fbb52a8cf736f05c6f9f9eb512dbaed
SHA2564114047844d27eb81c3e5a182f5217f21c6fc8ab9dfa1354370281d3212bfa28
SHA512410961ef2faa33faa77bf765eb585f2eca951865d718a16d6f4b03337e23a3a01a19ecf421fe4f2325de04a6446aa7687f0ad7953bb878d610f9821c82b28056
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5b3c5cd1ef8a4d652f474033240a754b2
SHA10c66923d01ee38851e2bd0d5aa9eedd466e06092
SHA256a9cb4be221a6e57b6525f6d269fe41ea1338c1e8d2b08414bd194300069ebd56
SHA5123ddaae6740a0889c9952ac37538ba02892b6b948b014a4793265813ea7e47974afcf1bbd17873535df3c44811d9863aaf3f67b54108513514332278ad6c2a4ba
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5d8479f02001fa238804d2f6bb3b22135
SHA1f4688f6db4688fa34ef348094e796d43824f6734
SHA25654cbeba4b6b76847fb1ee7ba11ff03daef125cb55ccfb9c72b30c62f91bed183
SHA512e64ecc6db96c87f9c96a746fdc2cbdfbc2a2037977caced3ae15899d46729d883aa9b0f18fc352df8262e6767c8c8902e15c038c7c3a0e1cccacb8cd6be86ec1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cf7c22d119b9ae7b6ac80ff8424e211b
SHA13e7f8114ba2f5a4cb451736b43ff3729f3c57f17
SHA25602d177031ed7c6f7ed532072c2ff337844ac0e876f8df823622f1a9ddf9f3b94
SHA512d1d42b2169f70b5a1fa855095b1caf37b8b3ea3a806f56b188073945162bd40d071247485f923ee6608ce68511a35a2323b177ed5e3ea303f8445e7b979aeea5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD506cfd355558732f5faac92a0efa6ae1d
SHA1621ca25769b2736555943ba817aff6da38f884af
SHA256164582ea2dcf2b85a63212ecfa633b3d0dc01618d91ef4ada3b080a7110b3a1a
SHA5120ab58d4248a379db1debef719d2b29e54b48548ef6e540851f687e6af3d95f86d4a5ef31c77736e7f518d60359a95767acadee02ea9c2518c169024f0e9538ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD56415f4fa96bbd391d5b4a8a13761dc31
SHA17ee7b91a6800709393979ca0757cdc40b5f9ba35
SHA2569fe23a0288ddd3d6fc91d68930b08cea03304cc04cc8198e4efaff2a9f6a5827
SHA512b4f77a34ed687a605a00edb248c001f6a8d451555cb4664ee406bab4dfb812a10afca9aaddd4b0cd4f6c80645f17684516b92e2bfe3a8d1b98282c88c80730e5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD57ab8c7689f9bbc50e218d9c9463adca7
SHA116d13de5325f3abce198f195c89519530f9305d1
SHA256a457cf3a51f1a9b4e97c800558f36ead275d48ccc90314f8d8a3559feb5e805e
SHA5122b7b053f63fe9a3edde8677bd7b1a700fb2e67939a7358517e2a4ddadaf02e7cb3254075f66513aee0e788eddd70169a1529e9973233aa6b447d6edefa03e362
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54666343db1744a8b694872eca2ffe203
SHA199d2a083984569760cdeab66c0a4c10943b6b02d
SHA25628d9c5a5632430246a60484450e028c29c0548f239c87cc321fb6de51ae43961
SHA512b5380476a50e1649ea64993134d1fa854699685b0d477462dc5a015d750deac9edc741e189d0f5bd234654a5aaa9764d94d09cc3d80f5ac3683e9ad454db7318
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5c88e713f4dd2cb13cf6002c5ffec18ae
SHA103526ccd605a7eb799982cb0498f25481b0fadd9
SHA25689c6ab9359977530fda50403a501a9a464e85f8e669b230d986fcc256e8ecea1
SHA5125bbdc4e8bd9f9c4b31fdf1d8f8356aab51b415a485d9c95ea4593707b7f96ef14cb461d1733a6ddacbda22b79095d03c97cb84de9ba820091828f6021339345d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD54ddb593776a1bf2f83deeb7074482f36
SHA18d348b4580972c47f706c7e3e1029896de5a6aad
SHA256c2ce7b78e96d11799a764b31ad0da28ccaae604d33ec546978e82108e6d126fc
SHA5123576523473284d3923d7a90306409b676d02e212bcaee80b7d8f9fdfb8c735622e9d757a687d5a1c35ba2c5f365f82eafdb1aeae37ced503aecd4053810c8fd8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5af48ca40f73156f34b4b8a762f0dd1c4
SHA1e0daa5363ad811f5beafd59ba1e9038fc3ef41fb
SHA2566342772b0f94c825860d0dcbdca74777757497d5f4cad8d991f254104d8c61f1
SHA512c7cd05ca99c2f223c917ac1edc96585529678f94f001131a76683167ac980c9ee13439cca4fcbda9c3675c3c56d9e1102e5377534002551b28f64d83c9429d13
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD55cecae31a2e5926abeeb0c8ef20001c3
SHA1611af86916725f65f765b83d92f2c106e9849213
SHA256ccd9ab221512b346ef82c162240bedc5b4f94702072947082b3ea594088c58b4
SHA5122eb937d1d9941d78b1cdbc239be300de3768ab1443396acf44f42626ac6ed511aaa29789566d1c47fd81799503ab362d877a343dce3e0c87fa15654dbc55fe3f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5cbf0d68922952e868bbdb22d5f7b1bd0
SHA1179a04e28df8ad97b3d06109059fa987e41162b4
SHA256ff0b3b803d384ee9b0b79252e392e4d93a2431d448391d7911f15afef2d3eced
SHA51233b9bad0f09106a14a7eb3a90a0e846421893a57527491b0f739c7498f364d340a5db5e45da45c047c12445b79007d422878e84ed83d05cb0ef90b91bca07862
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD5496bdef8244acd3441b51a50c367631d
SHA19458ca4480fd91c541ca5024ced068a11638c0f2
SHA256206d48083a91311de10f5a60bb460f9478bbed3eda37fd689ed7d32dc05c0716
SHA512295ee36fdb8fe12337898aed74ceb972ce89df0fed17892818a5557efa2462ae0c97a839b10fc888910c7b3870ab9e900b62fd52cfccfd487dccd859ac58321b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD505461589e853dbd4072fe16a9fe8bfeb
SHA18a12b55ac7a031937851cd13804cc0a740e8803b
SHA25610f5f974ec61ac84be4074b364c0b2bdf52fc3a62aec6b5f5ad871a7aaae3327
SHA512dac5c81e2076f749d9837948c252cf7d177a377b1a8dda8c1d245f93eb9716003d0bc8eed4fb8445e6994be753aebf64cc5c01136839c83aa6c25afc1d67f908
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize304B
MD531264d273a1375900a88550540fd7cad
SHA1918272dffb99fc4a8fb1cf36f41417ec7eba1b35
SHA256c157838c9cff7d30422f577a086090c806fcf0c7db0b48c33ef1291dd6e73ab8
SHA512ae7bd3b7025700d9d9d3e05b262a8a905da94eb83d10f413d2685179a449fd438a06ef43440a655435755766a6b5b0cffa89c93c88e0f81889d3f3ca13a07bdf
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a